Machine Learning and Intelligent Communications. First International Conference, MLICOM 2016, Shanghai, China, August 27-28, 2016, Revised Selected Papers

Research Article

Bandwidth and Power Allocation for Wireless Cognitive Network with Eavesdropper

Download
197 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-52730-7_22,
        author={Kecai Gu and Weidang Lu and Guomin Zhou and Hong Peng and Zhijiang Xu and Xin Liu},
        title={Bandwidth and Power Allocation for Wireless Cognitive Network with Eavesdropper},
        proceedings={Machine Learning and Intelligent Communications. First International Conference, MLICOM 2016, Shanghai, China, August 27-28, 2016, Revised Selected Papers},
        proceedings_a={MLICOM},
        year={2017},
        month={2},
        keywords={Cognitive radio Physical layer security Artificial noise Achievable secrecy rate Power allocation},
        doi={10.1007/978-3-319-52730-7_22}
    }
    
  • Kecai Gu
    Weidang Lu
    Guomin Zhou
    Hong Peng
    Zhijiang Xu
    Xin Liu
    Year: 2017
    Bandwidth and Power Allocation for Wireless Cognitive Network with Eavesdropper
    MLICOM
    Springer
    DOI: 10.1007/978-3-319-52730-7_22
Kecai Gu1,*, Weidang Lu1, Guomin Zhou2, Hong Peng1, Zhijiang Xu1, Xin Liu3
  • 1: Zhejiang University of Technology
  • 2: Zhejiang Police College
  • 3: Dalian University of Technology
*Contact email: celus@zjut.edu.cn

Abstract

In this paper, we consider secure communications for a five-node cognitive wireless network system including one primary user (PU) pair and one secondary user (SU) pair in presence of one eavesdropper. The secrecy transmission process departs into two equal time phases. To ensure transmission process safety, the primary source and receiver are allowed to deliver artificial noise to interfere the eavesdropper. To obtain higher spectrum efficiency, we propose an anti-interference spectrum access strategy with cooperative trusted DF relaying over flat fading channel, in which secondary user forward primary information and deliver its own information with different part of licensed spectrum. We study how to optimize the bandwidth and power allocation ratio to maximize the secondary user rate while guaranteeing the primary system to achieve its target secrecy rate. The expression of the optimal bandwidth allocation ratio is derived. Simulation results demonstrate that proposed strategy can achieve win-win result.